speckit-checklist
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/check-prerequisites.shexecutesevalon the output of theget_feature_pathsfunction. Inscripts/common.sh,get_feature_pathsgenerates a string by wrapping variables likeREPO_ROOTandCURRENT_BRANCHin single quotes. Because these variables are derived from environment data such as directory names or git branch names, an attacker could craft a malicious directory or branch name containing a single quote and shell commands (e.g.,001-feat'$(id)') to achieve arbitrary code execution when the script is run. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes external files (
spec.md,plan.md,tasks.md) that may contain untrusted content. - Ingestion points: Reads requirement and plan files from the
FEATURE_DIRpath. - Boundary markers: None identified. The skill does not use specific delimiters or instructions to treat the ingested file content as data only.
- Capability inventory: The skill has the ability to execute local shell scripts and write files to the local filesystem.
- Sanitization: No sanitization or filtering of the ingested content is performed before it is passed to the LLM for analysis.
Recommendations
- AI detected serious security threats
Audit Metadata